A user-centric privacy-preserving authentication protocol for IoT-AmI environments

被引:21
作者
Masud, Mehedi [1 ]
Gaba, Gurjot Singh [2 ]
Kumar, Pardeep [3 ]
Gurtov, Andrei [2 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, Taif 21944, Saudi Arabia
[2] Linkoping Univ LiU, Dept Comp & Informat Sci IDA, S-58183 Linkoping, Sweden
[3] Swansea Univ, Dept Comp Sci, Swansea SA1 8EN, Wales
关键词
Ambient intelligence; Blockchain; Fog computing; Healthcare; Internet of Things (IoT); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; INDUSTRIAL INTERNET; BLOCKCHAIN; SECURE; HASH; FRAMEWORK; CONSENSUS; ROBUST;
D O I
10.1016/j.comcom.2022.09.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has improved patient engagement and gratification as doctors' interactions have become more comfortable and efficient. However, the benefits of the AmI-IoT-based healthcare applications are not availed entirely due to the adversarial threats. IoT networks are prone to cyber attacks due to vulnerable wireless mediums and the absentia of lightweight and robust security protocols. This paper introduces computationally-inexpensive privacy-assuring authentication protocol for AmI-IoT healthcare applications. The use of blockchain & fog computing in the protocol guarantees unforgeability, non-repudiation, transparency, low latency, and efficient bandwidth utilization. The protocol uses physically unclonable functions (PUF), biometrics, and Ethereum powered smart contracts to prevent replay, impersonation, and cloning attacks. Results prove the resource efficiency of the protocol as the smart contract incurs very minimal gas and transaction fees. The Scyther results validate the robustness of the proposed protocol against cyber-attacks. The protocol applies lightweight cryptography primitives (Hash, PUF) instead of conventional public-key cryptography and scalar multiplications. Consequently, the proposed protocol is better than centralized infrastructure-based authentication approaches.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 52 条
[1]   Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing [J].
Athanere, Smita ;
Thakur, Ramesh .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (04) :1523-1534
[2]   Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT [J].
Banerjee, Soumya ;
Bera, Basudeb ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Khan, Muhammad Khurram ;
Rodrigues, Joel J. P. C. .
COMPUTER COMMUNICATIONS, 2021, 169 :99-113
[3]   A decision-making framework for evaluating appropriate business blockchain platforms using multiple preference formats and VIKOR [J].
Buyukozkan, Gulcin ;
Tufekci, Gizem .
INFORMATION SCIENCES, 2021, 571 :337-357
[4]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[5]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]   Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4900-4913
[7]  
Deebak B., 2022, SUSTAINABLE CITIES S
[8]   Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client-Server Systems [J].
Deebak, Bakkiam David .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) :1013-1035
[9]   A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment [J].
Esfahani, Alireza ;
Mantas, Georgios ;
Matischek, Rainer ;
Saghezchi, Firooz B. ;
Rodriguez, Jonathan ;
Bicaku, Ani ;
Maksuti, Silia ;
Tauber, Markus G. ;
Schmittner, Christoph ;
Bastos, Joaquim .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :288-296
[10]   Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks [J].
Ever, Yoney Kirsal .
IEEE SYSTEMS JOURNAL, 2019, 13 (01) :456-467